EP1871138A2 - Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem - Google Patents

Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem Download PDF

Info

Publication number
EP1871138A2
EP1871138A2 EP07012200A EP07012200A EP1871138A2 EP 1871138 A2 EP1871138 A2 EP 1871138A2 EP 07012200 A EP07012200 A EP 07012200A EP 07012200 A EP07012200 A EP 07012200A EP 1871138 A2 EP1871138 A2 EP 1871138A2
Authority
EP
European Patent Office
Prior art keywords
security function
communications device
protocol entity
security
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07012200A
Other languages
English (en)
French (fr)
Inventor
Li-Chih Tseng
Sam Shiaw-Shiang Jiang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Innovative Sonic Ltd
Original Assignee
Innovative Sonic Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Innovative Sonic Ltd filed Critical Innovative Sonic Ltd
Publication of EP1871138A2 publication Critical patent/EP1871138A2/de
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/02Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/20Interfaces between hierarchically similar devices between access points

Definitions

  • the present invention relates to a method for security sequence numbering and related communications device according to the pre-characterizing clauses of claims 1 and 2.
  • COUNT-I integrity protection sequence number
  • the integrity sequence number COUNT-I is 32 bits long.
  • COUNT-I value per uplink signaling RB
  • COUNT-I value per downlink signaling RB.
  • COUNT-I is composed of two parts: a. "short" sequence number and a "long” sequence number. The "short" sequence number forms least significant bits of COUNT-I, whereas the "long” sequence number forms most significant bits of COUNT-I.
  • the "short" sequence number is a 4-bit RRC sequence number (RRC SN) that is available in each RRC PDU.
  • the "long” sequence number is a 28-bit RRC hyper frame number (RRC HFN), which is incremented at each RRC SN cycle.
  • Section 6.6.4 of 3GPP TS 33.102 describes a ciphering sequence number COUNT-C.
  • the ciphering sequence number COUNT-C is 32 bits long.
  • Each uplink RB and each downlink RB using RLC AM or RLC UM has one COUNT-C value.
  • COUNT-C is the same, and COUNT-C is also the same for uplink and downlink.
  • COUNT-C is composed of two parts: a "short" sequence number and a "long" sequence number. The short sequence number forms least significant bits of COUNT-C, whereas the long sequence number forms most significant bits of COUNT-C. Update of COUNT-C depends on transmission mode. The use of different sequence numbers for integrity protection and ciphering causes overhead, making transmission inefficient.
  • the present invention aims at providing a method for security sequence numbering and related communications device that reduces overhead.
  • the claimed method for security sequence numbering and related communications device includes using a first sequence number in a second protocol entity as a parameter of a second security function.
  • the third generation (3G) mobile telecommunications system has adopted a Wideband Code Division Multiple Access (WCDMA) wireless air interface access method for a cellular network.
  • WCDMA Wideband Code Division Multiple Access
  • the WCDMA method also meets all kinds of QoS requirements simultaneously, providing diverse, flexible, two-way transmission services and better communication quality to reduce transmission interruption rates.
  • a wireless communications device such as a mobile phone
  • these functions rely on fast, instantaneous transmission.
  • HSDPA High Speed Downlink Package Access
  • HSUPA High Speed Uplink Package Access
  • HSUPA High Speed Uplink Package Access
  • 3GPP TS 33.102 "3G Security; Security architecture,” defines a security architecture for the 3G mobile telecommunications system.
  • the security architecture can be categorized by security features and security mechanisms.
  • Security features are service capabilities that meet one or more security requirements, whereas security mechanisms are elements used to realize the security features.
  • user data confidentiality is one of the security features, and a stream cipher using a derived cipher key is the security mechanism that realizes the user data confidentiality security feature.
  • Fig. 1 is a function block diagram of a communications device 100.
  • Fig. 1 only shows an input device 102, an output device 104, a control circuit 106, a central processing unit (CPU) 108, a memory 110, a program code 112, and a transceiver 114 of the communications device 100.
  • the control circuit 106 executes the program code 112 in the memory 110 through the CPU 108, thereby controlling an operation of the communications device 100.
  • the communications device 100 can receive signals input by a user through the input device 102, such as a keyboard, and can output images and sounds through the output device 104, such as a monitor or speakers.
  • the transceiver 114 is used to receive and transmit wireless signals, delivering received signals to the control circuit 106, and outputting signals generated by the control circuit 106 wirelessly. From a perspective of a communications protocol framework, the transceiver 114 can be seen as a portion of Layer 1, and the control circuit 106 can be utilized to realize functions of Layer 2 and Layer 3. Preferably, the communications device 100 is utilized in a third generation (3G) mobile communications system.
  • 3G third generation
  • Fig. 2 is a diagram of the program code 112 shown in Fig. 1.
  • the program code 112 includes an application layer 200, a Layer 3 202, and a Layer 2 206, and is coupled to a Layer 1 218.
  • the Layer 3 202 comprises a radio resource control (RRC) entity 210.
  • the RRC entity 210 provides an RRC SN for each RRC message to facilitate integrity protection.
  • the Layer 2 206 comprises two sub-layers: a radio link control (RLC) entity 226 and a packet data convergence protocol (PDCP) entity 224.
  • the PDCP entity 224 is an upper layer to the RLC entity 226.
  • the RLC entity 226 Primary functions of the RLC entity 226 include segmentation, reassembly, concatenation, padding, retransmission, sequence check, and duplication detection on transmitted data or control instructions.
  • the PDCP entity 224 is primarily responsible for compression/decompression of headers, transfer of user data, and maintenance of PDCP sequence numbers.
  • the PDCP entity 224 In LTE, the PDCP entity 224 must provide a PDCP SN for each packet, i.e. for each RLC SDU, to facilitate ciphering functionality.
  • the RLC entity 226 can use the PDCP SNs when performing re-ordering, duplication detection, flow control, and ARQ functionalities.
  • the program code 112 comprises a security sequence numbering program code 220.
  • FIG. 3 is a flowchart of a process 30 according to a first embodiment of the present invention.
  • the process 30 is utilized for data framing in the wireless communications system, and can be compiled into the security sequence numbering program code 220.
  • the process 30 comprises the following steps:
  • the first security function could be integrity protection, and the second security function could be ciphering.
  • the first protocol entity and the second protocol entity can be in the same layer. The same layer could be the PDCP layer or a radio resource control (RRC) layer.
  • the first sequence number could be further used in a third protocol entity, such as an RLC entity or a medium access control (MAC) entity.
  • the first protocol entity and the second protocol entity could also be in different layers.
  • the first entity is the RRC entity which provides integrity protection
  • the second entity is the PDCP entity which provides ciphering.
  • the present invention uses one sequence number in the first security function of the first protocol entity and the second security function of the second protocol entity to reduce overhead and complexity compared to the prior art.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
  • Time-Division Multiplex Systems (AREA)
EP07012200A 2006-06-22 2007-06-21 Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem Withdrawn EP1871138A2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US80547106P 2006-06-22 2006-06-22

Publications (1)

Publication Number Publication Date
EP1871138A2 true EP1871138A2 (de) 2007-12-26

Family

ID=38564609

Family Applications (2)

Application Number Title Priority Date Filing Date
EP07012200A Withdrawn EP1871138A2 (de) 2006-06-22 2007-06-21 Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem
EP07012198A Withdrawn EP1871137A2 (de) 2006-06-22 2007-06-21 Verfahren und Vorrichtung zur Behandlung von Statusberichten nach der Weiterreichung in einem drahtlosen Kommunikationssystem

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP07012198A Withdrawn EP1871137A2 (de) 2006-06-22 2007-06-21 Verfahren und Vorrichtung zur Behandlung von Statusberichten nach der Weiterreichung in einem drahtlosen Kommunikationssystem

Country Status (6)

Country Link
US (2) US20070298781A1 (de)
EP (2) EP1871138A2 (de)
JP (2) JP2008005510A (de)
KR (2) KR20070121599A (de)
CN (2) CN101094474A (de)
TW (2) TW200803373A (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010012773A1 (en) * 2008-07-31 2010-02-04 Nokia Siemens Networks Oy Radio layer emulation of real time protocol sequence number and timestamp

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007184938A (ja) * 2006-01-04 2007-07-19 Asustek Computer Inc 無線通信システムにおけるユーザー端の完全性保護設定方法及び装置
US7885663B2 (en) * 2006-02-06 2011-02-08 Lg Electronics Inc. MBMS dual receiver
US8160025B2 (en) * 2006-05-02 2012-04-17 Lg Electronics Inc. Method for data transmission during a handover in mobile communications system
US20070297369A1 (en) * 2006-06-21 2007-12-27 Innovative Sonic Limited Method and apparatus for data framing in a wireless communications system
EP1871138A2 (de) * 2006-06-22 2007-12-26 Innovative Sonic Limited Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem
US8660085B2 (en) * 2006-12-04 2014-02-25 Qualcomm Incorporated Methods and apparatus for transferring a mobile device from a source eNB to a target eNB
US8818375B2 (en) * 2007-04-25 2014-08-26 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for seamless handover in a wireless communication network
KR100907978B1 (ko) * 2007-09-11 2009-07-15 엘지전자 주식회사 이동통신 시스템에서 pdcp 계층의 상태보고 전송 방법 및 수신장치
KR101531419B1 (ko) 2008-02-01 2015-06-24 엘지전자 주식회사 시간동기 타이머의 만료 시 상향링크 harq의 동작 방법
WO2009096746A2 (en) 2008-02-01 2009-08-06 Lg Electronics Inc. Method for sending rlc pdu and allocating radio resource in mobile communications system and rlc entity of mobile communications
US20090207739A1 (en) * 2008-02-01 2009-08-20 Sung-Duck Chun Mobile communication system and method for transmitting pdcp status report thereof
ES2362173T3 (es) * 2008-02-04 2011-06-29 Lg Electronics Inc. Método de comunicación inalámbrica para transmitir una secuencia de unidades de datos entre un dispositivo inalámbrico y una red.
ES2362397T3 (es) 2008-04-11 2011-07-04 Innovative Sonic Limited Procedimiento y aparato para manipular un procedimiento de transferencia.
KR101778958B1 (ko) 2010-03-09 2017-09-18 삼성전자주식회사 멀티 유저의 전력 절감을 위한 단말 및 액세스 포인트의 통신 방법
US9515925B2 (en) * 2011-05-19 2016-12-06 Qualcomm Incorporated Apparatus and methods for media access control header compression
EP3001691A4 (de) * 2013-05-22 2016-10-19 Lg Electronics Inc Verfahren und vorrichtung zur verarbeitung von signalisierungsdaten zwischen schichten in einem ip-basierten digitalen rundfunksystem
WO2015163593A1 (en) 2014-04-22 2015-10-29 Lg Electronics Inc. Method for processing received pdcp pdus for d2d communication system and device therefor
US11102686B2 (en) 2017-08-11 2021-08-24 Htc Corporation Device and method of handling a handover
WO2019028893A1 (zh) 2017-08-11 2019-02-14 华为技术有限公司 数据传输的方法及相关设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5103478A (en) * 1989-04-27 1992-04-07 International Business Machines Corporation Secure management of keys using control vectors with multi-path checking
FI113119B (fi) * 1997-09-15 2004-02-27 Nokia Corp Menetelmä tietoliikenneverkkojen lähetysten turvaamiseksi
EP1075108A1 (de) * 1999-07-23 2001-02-07 BRITISH TELECOMMUNICATIONS public limited company Kryptographische Datenverteilung
FI110974B (fi) * 2000-03-01 2003-04-30 Nokia Corp Laskurin alustaminen, erityisesti radiokehyksiä varten
US6925183B2 (en) * 2001-08-16 2005-08-02 Asustek Computer Inc. Preventing shortened lifetimes of security keys in a wireless communications security system
KR20030078453A (ko) * 2002-03-29 2003-10-08 주식회사 엘지이아이 무선 랜에서의 데이터 암호화/복호화 방법 및 장치
US20030236085A1 (en) * 2002-06-21 2003-12-25 Chi-Fong Ho Method for synchronizing a security start value in a wireless communications network
US7254144B2 (en) * 2002-06-21 2007-08-07 Innovative Sonic Limited Method for synchronizing a start value for security in a wireless communications network
JP2004080071A (ja) * 2002-08-09 2004-03-11 Asustek Computer Inc 無線通信セキュリティ・システムにおけるセキュリティ・キーの過度な使用を防止するための方法
US6925298B2 (en) * 2002-08-26 2005-08-02 Asustek Computer Inc. Initialization for hyper frame number of signaling radio bearers
US7233671B2 (en) * 2003-02-13 2007-06-19 Innovative Sonic Limited Method for storing a security start value in a wireless communications system
US7281130B2 (en) * 2003-07-30 2007-10-09 Hewlett-Packard Development Company, L.P. Storing authentication sequences for expedited login to secure applications
JP4671776B2 (ja) 2005-06-15 2011-04-20 株式会社エヌ・ティ・ティ・ドコモ 秘匿処理装置及び秘匿処理方法
EP1871138A2 (de) * 2006-06-22 2007-12-26 Innovative Sonic Limited Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010012773A1 (en) * 2008-07-31 2010-02-04 Nokia Siemens Networks Oy Radio layer emulation of real time protocol sequence number and timestamp
GB2474208A (en) * 2008-07-31 2011-04-06 Nokia Siemens Networks Oy Radio layer emulation of real time protocol sequence number and timestamp

Also Published As

Publication number Publication date
CN101098508A (zh) 2008-01-02
JP2008005508A (ja) 2008-01-10
CN101094474A (zh) 2007-12-26
EP1871137A2 (de) 2007-12-26
KR20070121599A (ko) 2007-12-27
JP2008005510A (ja) 2008-01-10
TW200803373A (en) 2008-01-01
US20070298781A1 (en) 2007-12-27
TW200803273A (en) 2008-01-01
KR20070121600A (ko) 2007-12-27
KR100913373B1 (ko) 2009-08-20
US20080019515A1 (en) 2008-01-24

Similar Documents

Publication Publication Date Title
EP1871138A2 (de) Verfahren und Vorrichtung zur Nummerierung von Sicherheitssequenzen in einem drahtlosen Kommunikationssystem
FI107487B (fi) Datalähetyksen salausmenetelmä radiojärjestelmässä
US10135610B2 (en) Method and apparatus for ciphering packet units in wireless communications
US7512099B2 (en) Method, system and transmitting side protocol entity for sending packet data units for unacknowledged mode services
EP1855499A2 (de) Verfahren und Vorrichtung zum Einstellen der Aktivierungszeit der Verschlüsselung in einem drahtlosen Kommunikationssystem
EP2203996B1 (de) Verfahren und vorrichtung zur generierung von funkverbindungssteuerprotokolldatensätzen
US8743905B2 (en) Method and apparatus for bundling and ciphering data
JP4750346B2 (ja) データ伝送方法、ユーザー機器、及びgprs/edge無線アクセスネットワーク
EP1806943A2 (de) Verfahren und Vorrichtung zur Änderung der Integritätsschutzkonfiguration bei einem mobilen Benutzergerät eines drahtlosen Kommunikationssystems
JP4671776B2 (ja) 秘匿処理装置及び秘匿処理方法
Taferner et al. Wireless internet access over GSM and UMTS
KR20070120465A (ko) 무선 통신 시스템에서의 데이터 프레이밍 방법 및 장치
KR20160025831A (ko) 이동 통신 네트워크에서 패킷 손실 관리 방법
EP1833208A2 (de) Verfahren und Vorrichtung zum Auslösen der Übertragung von neuen Zeitplanungsinformationen in einem drahtlosen Kommunikationssystem
US20070155339A1 (en) Method and apparatus for initialization of integrity protection
JP5033424B2 (ja) 秘匿通信システム
EP1944939B1 (de) Verfahren und Vorrichtung zur Verschlüsselung in einem drahtlosen Kommunikationssystem
US20070297369A1 (en) Method and apparatus for data framing in a wireless communications system
EP2129060B1 (de) Verfahren und damit verbundene Vorrichtung zur Erhöhung der Übertragungseffizienz in einem Sender eines drahtlosen Kommunikationssystems
EP1947871A1 (de) Verfahren und Vorrichtung zum Neuordnen von Paketen in der PDCP-Schicht eines drahtlosen Kommunikationssystems
EP1879351A2 (de) Verfahren und Vorrichtung zur Erzeugung von Datenrahmen in einem drahtlosen Kommunikationssystem
EP1915016A2 (de) Verfahren und Vorrichtung zur Einrichtung der Konfigurationen eines Uplink-Transportkanals in einem drahtlosen Kommunikationssystem

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070621

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20100823